The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently over the millions of digital audio files such as digital songs are copied illegally during file-sharing over the networks. It has resulted as the loss of revenue for music and broadcasting industries. The traditional protection schemes are no longer useful to protect copyright and ownership of multimedia objects. These challenges have prompted significant research in digital audio watermarking...
Image hashing is one of the emergent novel approaches used extensively in the field of image forensics apart from finding its place in many of the latest techniques of the area of image indexing, image retrieval etc. Image hashing is basically used to identify the duplicate copies of the original images. Most of the image hashing algorithms has their limitations in getting the desirable performance...
Detection of lung abnormalities by characterizing lung sounds has been a primary step for clinical examination for a pulmonologist. This work focuses on utilization of cepstral features for lung sound analysis and classification. The proposed method incorporates statistical properties of cepstral features along with artificial neural network (ANN) based classification. Experimental results indicate...
Internet has made multimedia communication easier than ever. In present scenario huge amount of information is being shared as digital content. Copying of such digital content without apparent loss in quality is not a difficult task. Due to this, there are more chances of copying of such digital information. Thus, there is a great need of prohibiting such illegal copying of digital media. Digital...
Perceptual audio hashing, which summarizes big audio data into compact and robust digest, provides a useful tool for the identification, retrieval, authentication, and other information processing of multimedia contents. This paper proposes a perceptual audio hashing algorithm based on Radon transform in wavelet domain. The wavelet approximate coefficients are mapped into a two dimensional matrix...
This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The embedding and extraction processes have been carried out using the discrete cosine transform DCT. Image normalization process has been integrated and used to improve the robustness against geometric attacks. Handwritten...
Biometric has ever increasing demand in the field of security. However, integrity and security of biometric used to authenticate a legal user are the inherited problems of it. Since watermarking hides one form of digital data into other, its use in securing biometric data gives an added advantage. This concept has led to biometric watermarking technique in which one biometric can be embedded into...
The expansion of the Internet in the past years has rapidly enlarged the accessibility of digital data like digital audio, images and videos to the common community of people. The rapid development in information technologies has given an extended and easy access to digital data. Digital data is a major trend of business communication today. Therefore, copyright protection of digital data has been...
In this paper, an application for medical image encryption and watermarking to store patient information is proposed. By using scrambling algorithm, the 1st view patient information is hidden and require unique patient password to access a real image. For watermarking scene, a Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are applied to non-overlapping block size 8×8 image pixels...
In recent years, due to the increment in the image editing software applications and the easiness of using these, the probability of malicious changes on the images has also increased. Copy-move forgery is one of the most widely applied modification types on the images. In case of that the copied region is rotated before being pasted, forgery detection becomes difficult. Many researchers try on proposing...
The growth of network multimedia systems has expanded the demand for image copyright protection. Digital watermark is one approach which is often used for image copyright protection. However, there are limitations of robustness and confidentiality in the common digital watermarking algorithms to resist print-scan attacks. In this paper, a new method combining zero watermarking, blind watermarking...
Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking...
Practically, digital watermarking is considered as an advanced field of investigating to avoid unauthorized copying and duplication. In this paper, a comparative analysis is conducted among embedding the watermark on the edges of a cover image in two domains, spatial and frequency domains. In this work, the Sobel edge detection algorithm is used to find edges and embed the watermark on the edge in...
Own method of embedding information in still pictures was synthesized. New algorithm used additional blocks of cropping and stability under the previous image processing. This ensured the reliability of the system and increased the probability of correct recognition of embedded data. The complex analysis of the most relevant data hiding methods by multiobjective optimization was done. Also the comparative...
In this paper, We present a blind image watermarking method based on DCT domain and independent component analysis (ICA). First of all, an approximation of cover image is created using ICA. We divide approximation image to equal 8×8 blocks and then apply DCT transform to each block. We use spread spectrum (SS) method for embedding the watermark bits. In our method a group of random bits are generated...
Recently, the feature point matching based water-marking techniques have been paying attention for resisting the geometric attacks. We present a performance analysis of robust watermarking using linear and nonlinear feature. In particular, we consider the geometric attacks and the signal processing attacks for image watermarking. In order to analyze the efficiency of linear and nonlinear feature,...
In this paper, we propose a novel and robust image watermarking based on the extended DCT domain, called q-DCT domain. By using the extended DCT domain, we can control the quality of the watermarked image. In our proposed scheme, we embed the watermark in the low-frequency of q-DCT domain in order to achieve the robustness of watermark. We also choose in our method a watermarking technique in the...
In this paper, we introduce and investigate a new robust blind video watermarking. Unlike some existing methods based on spatial domain watermarking techniques, the even-odd quantization algorithm is applied in our paper to embed all bit plane images decomposed from a single watermark image into only selected robust Discrete Cosine Transform (DCT) coefficients of 8×8 blocks from a host video. As a...
The paper proposes an image watermarking algorithm on curvelet transform domain. Different from other conventional methods which embed the watermark in spatial domain, discrete cosine transform (DCT), or discrete wavelet transform (DWT), the present paper uses curvelet transform domain for image watermarking since curvelet transform is effective when representing curves with fewer coefficients than...
Arobust or perceptual hash function computes hashes of videos based on their perceptual contents. Two basic requirements for such hash function are the robustness against content-preserving operations and the sensitivity to dissimilar contents of distinct videos. This paper presents a new hash function that applies the 3D discrete wavelet transform on a group-of-frames and extracts a hash of it from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.